CVE-2023-5719
Summary
| CVE | CVE-2023-5719 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-11-06 20:15:00 UTC |
| Updated | 2023-11-14 19:29:00 UTC |
| Description | The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device. If such a password contains the percent (%) character, invalid values will be included, potentially truncating the string if a NUL is encountered. If the simplified password is not detected by the administrator, the device might be left in a vulnerable state as a result of more-easily compromised credentials. Note that passwords entered via the Crimson system web server do not suffer from this vulnerability. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Redlion | Crimson | All | All | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0008.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0014.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0015.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0016.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0020.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0021.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0025.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0026.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0030.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0031.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0035.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0036.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0040.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0041.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0044.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0047.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0050.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0051.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0053.0 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0053.1 | All | All |
| Application | Redlion | Crimson | 3.2 | build_3.2.0053.18 | All | All |
| Hardware | Redlion | Da50a | - | All | All | All |
| Hardware | Redlion | Da70a | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Advisories – Red Lion Support | MISC | support.redlion.net | |
| Red Lion Crimson | CISA | MISC | www.cisa.gov | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.